blob: 31e8e510f6c7ead265a366179f6812bc664cc5ed [file] [log] [blame]
# -*- coding: utf-8 -*-
# Copyright 2014 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Implementation of Url Signing workflow.
see: https://developers.google.com/storage/docs/accesscontrol#Signed-URLs)
"""
from __future__ import absolute_import
import base64
import calendar
from datetime import datetime
from datetime import timedelta
import getpass
import re
import time
import urllib
from apitools.base.py.exceptions import HttpError
from apitools.base.py.http_wrapper import MakeRequest
from apitools.base.py.http_wrapper import Request
from gslib.command import Command
from gslib.command_argument import CommandArgument
from gslib.cs_api_map import ApiSelector
from gslib.exception import CommandException
from gslib.storage_url import ContainsWildcard
from gslib.storage_url import StorageUrlFromString
from gslib.util import GetNewHttp
from gslib.util import NO_MAX
from gslib.util import UTF8
try:
# Check for openssl.
# pylint: disable=C6204
from OpenSSL.crypto import load_pkcs12
from OpenSSL.crypto import sign
HAVE_OPENSSL = True
except ImportError:
load_pkcs12 = None
sign = None
HAVE_OPENSSL = False
_SYNOPSIS = """
gsutil signurl [-c] [-d] [-m] [-p] pkcs12-file url...
"""
_DETAILED_HELP_TEXT = ("""
<B>SYNOPSIS</B>
""" + _SYNOPSIS + """
<B>DESCRIPTION</B>
The signurl command will generate signed urls that can be used to access
the specified objects without authentication for a specific period of time.
Please see the `Signed URLs documentation
<https://developers.google.com/storage/docs/accesscontrol#Signed-URLs>`_ for
background about signed URLs.
Multiple gs:// urls may be provided and may contain wildcards. A signed url
will be produced for each provided url, authorized
for the specified HTTP method and valid for the given duration.
Note: Unlike the gsutil ls command, the signurl command does not support
operations on sub-directories. For example, if you run the command:
gsutil signurl <private-key-file> gs://some-bucket/some-object/
The signurl command uses the private key for a service account (the
'<private-key-file>' argument) to generate the cryptographic
signature for the generated URL. The private key file must be in PKCS12
format. The signurl command will prompt for the passphrase used to protect
the private key file (default 'notasecret'). For more information
regarding generating a private key for use with the signurl command please
see the `Authentication documentation.
<https://developers.google.com/storage/docs/authentication#generating-a-private-key>`_
gsutil will look up information about the object "some-object/" (with a
trailing slash) inside bucket "some-bucket", as opposed to operating on
objects nested under gs://some-bucket/some-object. Unless you actually
have an object with that name, the operation will fail.
<B>OPTIONS</B>
-m Specifies the HTTP method to be authorized for use
with the signed url, default is GET.
-d Specifies the duration that the signed url should be valid
for, default duration is 1 hour.
Times may be specified with no suffix (default hours), or
with s = seconds, m = minutes, h = hours, d = days.
This option may be specified multiple times, in which case
the duration the link remains valid is the sum of all the
duration options.
-c Specifies the content type for which the signed url is
valid for.
-p Specify the keystore password instead of prompting.
<B>USAGE</B>
Create a signed url for downloading an object valid for 10 minutes:
gsutil signurl -d 10m <private-key-file> gs://<bucket>/<object>
Create a signed url for uploading a plain text file via HTTP PUT:
gsutil signurl -m PUT -d 1h -c text/plain <private-key-file> \\
gs://<bucket>/<obj>
To construct a signed URL that allows anyone in possession of
the URL to PUT to the specified bucket for one day, creating
any object of Content-Type image/jpg, run:
gsutil signurl -m PUT -d 1d -c image/jpg <private-key-file> \\
gs://<bucket>/<obj>
""")
def _DurationToTimeDelta(duration):
r"""Parses the given duration and returns an equivalent timedelta."""
match = re.match(r'^(\d+)([dDhHmMsS])?$', duration)
if not match:
raise CommandException('Unable to parse duration string')
duration, modifier = match.groups('h')
duration = int(duration)
modifier = modifier.lower()
if modifier == 'd':
ret = timedelta(days=duration)
elif modifier == 'h':
ret = timedelta(hours=duration)
elif modifier == 'm':
ret = timedelta(minutes=duration)
elif modifier == 's':
ret = timedelta(seconds=duration)
return ret
def _GenSignedUrl(key, client_id, method, md5,
content_type, expiration, gcs_path):
"""Construct a string to sign with the provided key and returns \
the complete url."""
tosign = ('{0}\n{1}\n{2}\n{3}\n/{4}'
.format(method, md5, content_type,
expiration, gcs_path))
signature = base64.b64encode(sign(key, tosign, 'RSA-SHA256'))
final_url = ('https://storage.googleapis.com/{0}?'
'GoogleAccessId={1}&Expires={2}&Signature={3}'
.format(gcs_path, client_id, expiration,
urllib.quote_plus(str(signature))))
return final_url
def _ReadKeystore(ks_contents, passwd):
ks = load_pkcs12(ks_contents, passwd)
client_id = (ks.get_certificate()
.get_subject()
.CN.replace('.apps.googleusercontent.com',
'@developer.gserviceaccount.com'))
return ks, client_id
class UrlSignCommand(Command):
"""Implementation of gsutil url_sign command."""
# Command specification. See base class for documentation.
command_spec = Command.CreateCommandSpec(
'signurl',
command_name_aliases=['signedurl', 'queryauth'],
usage_synopsis=_SYNOPSIS,
min_args=2,
max_args=NO_MAX,
supported_sub_args='m:d:c:p:',
file_url_ok=False,
provider_url_ok=False,
urls_start_arg=1,
gs_api_support=[ApiSelector.XML, ApiSelector.JSON],
gs_default_api=ApiSelector.JSON,
argparse_arguments=[
CommandArgument.MakeNFileURLsArgument(1),
CommandArgument.MakeZeroOrMoreCloudURLsArgument()
]
)
# Help specification. See help_provider.py for documentation.
help_spec = Command.HelpSpec(
help_name='signurl',
help_name_aliases=['signedurl', 'queryauth'],
help_type='command_help',
help_one_line_summary='Create a signed url',
help_text=_DETAILED_HELP_TEXT,
subcommand_help_text={},
)
def _ParseAndCheckSubOpts(self):
# Default argument values
delta = None
method = 'GET'
content_type = ''
passwd = None
for o, v in self.sub_opts:
if o == '-d':
if delta is not None:
delta += _DurationToTimeDelta(v)
else:
delta = _DurationToTimeDelta(v)
elif o == '-m':
method = v
elif o == '-c':
content_type = v
elif o == '-p':
passwd = v
else:
self.RaiseInvalidArgumentException()
if delta is None:
delta = timedelta(hours=1)
expiration = calendar.timegm((datetime.utcnow() + delta).utctimetuple())
if method not in ['GET', 'PUT', 'DELETE', 'HEAD']:
raise CommandException('HTTP method must be one of [GET|HEAD|PUT|DELETE]')
return method, expiration, content_type, passwd
def _ProbeObjectAccessWithClient(self, key, client_id, gcs_path):
"""Performs a head request against a signed url to check for read access."""
signed_url = _GenSignedUrl(key, client_id, 'HEAD', '', '',
int(time.time()) + 10, gcs_path)
try:
h = GetNewHttp()
req = Request(signed_url, 'HEAD')
response = MakeRequest(h, req)
if response.status_code not in [200, 403, 404]:
raise HttpError(response)
return response.status_code
except HttpError as e:
raise CommandException('Unexpected response code while querying'
'object readability ({0})'.format(e.message))
def _EnumerateStorageUrls(self, in_urls):
ret = []
for url_str in in_urls:
if ContainsWildcard(url_str):
ret.extend([blr.storage_url for blr in self.WildcardIterator(url_str)])
else:
ret.append(StorageUrlFromString(url_str))
return ret
def RunCommand(self):
"""Command entry point for signurl command."""
if not HAVE_OPENSSL:
raise CommandException(
'The signurl command requires the pyopenssl library (try pip '
'install pyopenssl or easy_install pyopenssl)')
method, expiration, content_type, passwd = self._ParseAndCheckSubOpts()
storage_urls = self._EnumerateStorageUrls(self.args[1:])
if not passwd:
passwd = getpass.getpass('Keystore password:')
ks, client_id = _ReadKeystore(open(self.args[0], 'rb').read(), passwd)
print 'URL\tHTTP Method\tExpiration\tSigned URL'
for url in storage_urls:
if url.scheme != 'gs':
raise CommandException('Can only create signed urls from gs:// urls')
if url.IsBucket():
gcs_path = url.bucket_name
else:
# Need to url encode the object name as Google Cloud Storage does when
# computing the string to sign when checking the signature.
gcs_path = '{0}/{1}'.format(url.bucket_name,
urllib.quote(url.object_name.encode(UTF8)))
final_url = _GenSignedUrl(ks.get_privatekey(), client_id,
method, '', content_type, expiration,
gcs_path)
expiration_dt = datetime.fromtimestamp(expiration)
print '{0}\t{1}\t{2}\t{3}'.format(url.url_string.encode(UTF8), method,
(expiration_dt
.strftime('%Y-%m-%d %H:%M:%S')),
final_url.encode(UTF8))
response_code = self._ProbeObjectAccessWithClient(ks.get_privatekey(),
client_id, gcs_path)
if response_code == 404 and method != 'PUT':
if url.IsBucket():
msg = ('Bucket {0} does not exist. Please create a bucket with '
'that name before a creating signed URL to access it.'
.format(url))
else:
msg = ('Object {0} does not exist. Please create/upload an object '
'with that name before a creating signed URL to access it.'
.format(url))
raise CommandException(msg)
elif response_code == 403:
self.logger.warn(
'%s does not have permissions on %s, using this link will likely '
'result in a 403 error until at least READ permissions are granted',
client_id, url)
return 0